| #### PHRACK PRESENTS ISSUE 17 #### |
|
|
| ^*^*^*^ Phrack World News, Part 3 ^*^*^*^ |
|
|
| **** File 12 of 12 **** |
|
|
|
|
| +-------------------------------------------------------------------------+ |
| -[ PHRACK XVII ]----------------------------------------------------------- |
|
|
| "The Code Crackers are Cheating Ma Bell" |
| Typed by the Sorceress from the San Francisco Chronicle |
| Edited by the $muggler |
|
|
| The Far Side..........................(415)471-1138 |
| Underground Communications, Inc.......(415)770-0140 |
|
|
| +-------------------------------------------------------------------------+ |
| In California prisons, inmates use "the code" to make free telephone calls |
| lining up everything from gun running jobs to visits from grandma. |
|
|
| In a college dormitory in Tennessee, students use the code to open up a |
| long-distance line on a pay phone for 12 straight hours of free calls. |
|
|
| In a phone booth somewhere in the Midwest, a mobster uses the code to make |
| untraceable calls that bring a shipment of narcotics from South America to the |
| United States. |
|
|
| The code is actually millions of different personal identification numbers |
| assigned by the nation's telephone companies. Fraudulent use of those codes |
| is now a nationwide epidemic that is costing America's phone companies more |
| than $500 million each year. |
|
|
| In the end, most of that cost is passed on to consumers, in the form of higher |
| phone rates, analysts say. |
|
|
| The security codes range form multidigit access codes used by customers of the |
| many alternative long-distance companies to the "calling card" numbers |
| assigned by America Telephone & Telegraph and the 22 local phone companies, |
| such as Pacific Bell. |
|
|
| Most of the loss comes form the activities of computer hackers, said Rene |
| Dunn, speaking for U.S. Sprint, the third-largest long-distance company. |
|
|
| These technical experts - frequently bright, if socially reclusive, teenagers |
| - set up their computers to dial the local access telephone number of one of |
| the alternative long-distance firms, such as MCI and U.S. Sprint. When the |
| phone answers, a legitimate customer would normally punch in a secret personal |
| code, usually five digits, that allows him to make his call. |
|
|
| Hackers, however, have devised computer programs that will keep firing |
| combinations of numbers until it hits the right combination, much like a |
| safecracker waiting for the telltale sound of pins and tumblers meshing. |
|
|
| Then the hacker- known in the industry as a "cracker" because he has cracked |
| the code- has full access to that customer's phone line. |
|
|
| The customer does not realize what has happened until a huge phone bill |
| arrives at the end of the month. By that time, his access number and personal |
| code have been tacked up on thousands of electronic bulletin boards throughout |
| the country, accessible to anyone with a computer, a telephone and a modem, |
| the device that allows the computer to communicate over telephone lines. |
|
|
| "This is definitely a major problem," said one telephone security expert, who |
| declined to be identified. "I've seen one account with a $98,000 monthly |
| bill." |
|
|
| One Berkeley man has battled the telephone cheats since last fall, when his |
| MCI bill showed about $100 in long-distance calls he had not made. |
|
|
| Although MCI assured him that the problem would be taken care of, the man's |
| latest bill was 11 pages long and has $563.40 worth of long-distance calls. |
| Those calls include: |
|
|
| [] A two-hour call to Hyattsville, Maryland, on January 22. A woman who |
| answered the Hyattsville phone said she had no idea who called her house. |
|
|
| [] Repeated calls to a dormitory telephone at UCLA. The student who answered |
| the phone there said she did not know who spent 39 minutes talking to her, |
| or her roommate, shortly after midnight on January 23. |
|
|
| [] Calls to dormitory rooms at Washington State University in Pullman and to |
| the University of Colorado in Boulder. Men who answered the phones there |
| professed ignorance of who had called them or of any stolen long-distance |
| codes. |
|
|
| The Berkeley customer, who asked not to be identified, said he reached his |
| frustration limit and canceled his MCI account. |
|
|
| The phone companies are pursing the hackers and other thieves with methods |
| that try to keep up with a technological monster that is linked by trillions |
| of miles of telephone lines. |
|
|
| The companies sometimes monitor customers' phone bills. If a bill that |
| averages about $40 or $50 a month suddenly soars to several hundred dollars |
| with calls apparently placed from all over the country on the same day, the |
| phone company flags the bill and tries to track the source of the calls. |
|
|
| The FBI makes its own surveillance sweeps of electronic bulletin boards, |
| looking for stolen code numbers. The phone companies occasionally call up |
| these boards and post messages, warning that arrest warrants will be coming |
| soon if the fraudulent practice does not stop. Reputable bulletin boards post |
| their own warnings to telephone hackers, telling them to stay out. |
|
|
| Several criminal prosecutions are already in the works, said Jocelyne Calia, |
| the manager of toll fraud for U.S. Sprint. |
|
|
| If the detectives do not want to talk about their methods, the underground is |
| equally circumspect. "If they (the companies) have effective (prevention) |
| methods, how come all this is still going on?" asked one computer expert, a |
| veteran hacker who says he went legitimate about 10 years ago. |
|
|
| The computer expert, who identified himself only as Dr. Strange, said he was |
| part of the original group of electronic wizards of the early 1970s who |
| devised the "blue boxes" complex instruments that emulate the tones of a |
| telephone and allowed these early hackers to break into the toll-free 800 |
| system and call all over the world free of charge. |
|
|
| The new hacker bedeviling the phone companies are simply the result of the |
| "technology changing to one of computers, instead of blue boxes" Dr. Strange |
| said. As the "phone company elevates the odds... the bigger a challenge it |
| becomes," he said. |
|
|
| A feeling of ambivalence toward the huge and largely anonymous phone companies |
| makes it easier for many people to rationalize their cheating. A woman in a |
| Southwestern state who obtained an authorization code from her boyfriend said, |
| through an intermediary, that she never really thought of telephone fraud as a |
| "moral issue." "I don't abuse it," the woman said of her newfound telephone |
| privilege. "I don't use it for long periods of time - I never talk for more |
| than an hour at a time - and I don't give it out to friends." Besides, she |
| said, the bills for calls she has been making all over the United States for |
| the past six weeks go to a "large corporation that I was dissatisfied with. |
| It's not as if an individual is getting the bills." |
|
|
| There is one place, however, where the phone companies maybe have the upper |
| hand in their constant war with the hackers and cheats. |
|
|
| In some prisons, said an MCI spokesman, "we've found we can use peer pressure. |
| Let's say we restrict access to the phones, or even take them out, and there |
| were a lot of prisoners who weren't abusing the phone system. So the word |
| gets spread to those guys about which prisoner it was that caused the |
| telephones to get taken out. Once you get the identification (of the |
| phone-abusing prisoner) out there, I don't think you have to worry much" the |
| spokesman said. "There's a justice system in the prisons, too." |
|
|
|
|